2021
DOI: 10.1109/access.2021.3100540
|View full text |Cite
|
Sign up to set email alerts
|

A Survey on the Security of Wired, Wireless, and 3D Network-on-Chips

Abstract: Network-on-Chips (NoCs) have been widely used as a scalable communication solution in the design of multiprocessor system-on-chips (MPSoCs). NoCs manage communications between on-chip Intellectual Property (IP) cores and allow processing cores to achieve higher performance by outsourcing their communication tasks. NoC paradigm is based on the idea of resource sharing where hardware resources, including buffers, communication links, routers, etc., are shared between all IPs of the MPSoC. In fact, the data being… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
2
1

Relationship

1
8

Authors

Journals

citations
Cited by 22 publications
(10 citation statements)
references
References 122 publications
0
5
0
Order By: Relevance
“…[22] provides a extensive survey on network on chip attack and countermeasures which focus only on security of electrical NoCs. A recent survey [68] explores security on wired, wireless as well as 3-D NoCs. However, it has two major limitations.…”
Section: Major Differences With Existing Surveysmentioning
confidence: 99%
“…[22] provides a extensive survey on network on chip attack and countermeasures which focus only on security of electrical NoCs. A recent survey [68] explores security on wired, wireless as well as 3-D NoCs. However, it has two major limitations.…”
Section: Major Differences With Existing Surveysmentioning
confidence: 99%
“…As an example, the HT in Figure 4 (in yellow) has the state vector s t = [2,1,3,4]. The action space of the described HT agent is multi-discrete, i.e., each input of the HT may choose an action from a set of five available actions.…”
Section: B Rl-based Ht Insertionmentioning
confidence: 99%
“…• Design source code or netlist can be infected with HTs by compromised employees. • Third-party intellectual properties (IPs) like processing cores, memory modules, I/O components, and networkon-chip [4] are often purchased and incorporated into a design to speed up time-to-market and lower design expenses. However, integrating IPs from untrusted vendors can pose a risk to the security and integrity of the IC.…”
Section: Introductionmentioning
confidence: 99%
“…For establishing communication among these elements, traditional wiring becomes less reliable. The best available solution for these complex wiring issues in System on Chip (SoC) is network on chip (NoC) [1]- [3]. NoC has established itself as the most dependable and legitimate method of connecting multiple cores in a SoC.…”
Section: Introductionmentioning
confidence: 99%